Hassan et al., 2017 - Google Patents
Digital Privacy and Security Using Windows: A Practical GuideHassan et al., 2017
- Document ID
- 6533827763793972344
- Author
- Hassan N
- Hijazi R
- Publication year
External Links
Snippet
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book …
- 238000000034 method 0 abstract description 60
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alabdan | Phishing attacks survey: Types, vectors, and technical approaches | |
Hassan et al. | Open source intelligence methods and tools | |
Rathore et al. | Social network security: Issues, challenges, threats, and solutions | |
Heartfield et al. | A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks | |
Fire et al. | Online social networks: threats and solutions | |
Kremling et al. | Cyberspace, cybersecurity, and cybercrime | |
Parsons et al. | The predator in your pocket: A multidisciplinary assessment of the stalkerware application industry | |
Hassan et al. | Digital Privacy and Security Using Windows: A Practical Guide | |
Pande | Introduction to cyber security | |
Varshney et al. | Anti-phishing: A comprehensive perspective | |
Wilner et al. | On the social science of ransomware: Technology, security, and society | |
Jakobsson | The death of the internet | |
Retzkin | Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it | |
Broadhurst | Cybercrime: Thieves, Swindlers, Bandits, and Privateers in Cyberspace | |
Ali et al. | Dark World: A Book on the Deep Dark Web | |
Kissell | Take control of your online privacy | |
Frumento et al. | The role of Social Engineering in evolution of attacks | |
Speed et al. | Mobile Security: How to secure, privatize and recover your devices | |
Imtiaz et al. | Analysis of Cybersecurity Measures for Detection, Prevention, and Misbehaviour of Social Systems | |
Birthriya et al. | A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies | |
Day | Security in the Digital World: For the home user, parent, consumer and home office | |
Connolly | User privacy: A practical guide for librarians | |
Hudaib | Comprehensive social media security analysis & xkeyscore espionage technology | |
Roddel | The Ultimate Guide to Internet Safety Second Edition | |
Donaldson et al. | Understanding security issues |